期刊文献+
共找到611篇文章
< 1 2 31 >
每页显示 20 50 100
Slicing Java Generic Programs Using Generic System Dependence Graph
1
作者 CHEN Lin1,2,XU Baowen1,2 1.State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093,Jiangsu China 2.Department of Computer Science and Technology,Nanjing University,Nanjing 210093,Jiangsu China 《Wuhan University Journal of Natural Sciences》 CAS 2009年第4期304-308,共5页
The existing slicing algorithms do not consider parameterized types in generic programs, so they are not suitable for generic programs. To solve this problem, this paper presents a generic system dependence graph for ... The existing slicing algorithms do not consider parameterized types in generic programs, so they are not suitable for generic programs. To solve this problem, this paper presents a generic system dependence graph for Java generic programs based on the traditional system dependence graph to express dependences for parameterized type information. A novel slicing criterion and slicing algorithm for generic programs is proposed. The slices computed by the algorithm can help to understand relations between concepts and types for generic programs and can express the features of generic programs better. 展开更多
关键词 SLICING system dependence graph GENERICS program analysis
原文传递
DEGENERATE OPTIMAL BASIS GRAPHS IN LINEAR PROGRAMMING 被引量:1
2
作者 Lin Yixun\ Wen JianjunDept.of Math.,Zhengzhou Univ.,Zhengzhou450 0 52 . 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2000年第2期184-192,共9页
The basis graph \%G\% for a linear programming consists of all bases under pivot transformations. A degenerate optimal basis graph G * is a subgraph of \%G\% induced by all optimal bases at a degenerate optimal verte... The basis graph \%G\% for a linear programming consists of all bases under pivot transformations. A degenerate optimal basis graph G * is a subgraph of \%G\% induced by all optimal bases at a degenerate optimal vertex x 0. In this paper, several conditions for the characterization of G * are presented. 展开更多
关键词 Linear programming DEGENERACY transformation graphs.
全文增补中
A Dynamic Programming Approach for the Max-Min Cycle Packing Problem in Even Graphs
3
作者 Peter Recht 《Open Journal of Discrete Mathematics》 2016年第4期340-350,共11页
Let be an undirected graph. The maximum cycle packing problem in G then is to find a collection of edge-disjoint cycles C<sub>i</sup>in G such that s is maximum. In general, the maximum cycle packing probl... Let be an undirected graph. The maximum cycle packing problem in G then is to find a collection of edge-disjoint cycles C<sub>i</sup>in G such that s is maximum. In general, the maximum cycle packing problem is NP-hard. In this paper, it is shown for even graphs that if such a collection satisfies the condition that it minimizes the quantityon the set of all edge-disjoint cycle collections, then it is a maximum cycle packing. The paper shows that the determination of such a packing can be solved by a dynamic programming approach. For its solution, an-shortest path procedure on an appropriate acyclic networkis presented. It uses a particular monotonous node potential. 展开更多
关键词 Maximum Edge-Disjoint Cycle Packing Extremal Problems in graph Theory Dynamic programming -Shortest Path Procedure
在线阅读 下载PDF
西门子S7-Graph和S7-HiGraph语言的编程思路 被引量:1
4
作者 兰江 陈彬兵 《自动化信息》 2007年第10期63-65,共3页
本文主要讨论了西门子PLC编程软件STEP7中的两种可选编程语言S7-Graph(顺序功能图)和S7-HiGraph(状态图),着重介绍了它们的编程原则和思路。同时,通过将上述两种专业编程语言与基本的梯形图语言应用于同一具体实例中的对比,总结... 本文主要讨论了西门子PLC编程软件STEP7中的两种可选编程语言S7-Graph(顺序功能图)和S7-HiGraph(状态图),着重介绍了它们的编程原则和思路。同时,通过将上述两种专业编程语言与基本的梯形图语言应用于同一具体实例中的对比,总结出了它们对于其它基本编程语言的优越性。 展开更多
关键词 专业编程语言 S7-graph S7-Higraph 梯形图语言 优越性
在线阅读 下载PDF
THE Z SPECIFICATION DEPENDENCE GRAPH
5
作者 WuFangjun YiTong 《Journal of Electronics(China)》 2005年第2期201-204,共4页
The lack of existing solutions makes it really hard to understand formal specification languages since the application domain for representations is useful for the purpose of carrying out certain software engineering ... The lack of existing solutions makes it really hard to understand formal specification languages since the application domain for representations is useful for the purpose of carrying out certain software engineering operations such as slicing and the computation of program metrics.A Z specification dependence graph is presented in this letter. It draws on the strengths of a range of earlier works and adapts them, if necessary, to the Z language. 展开更多
关键词 program Dependence graph(PDG) System Dependence graph(SDG) Formal specification language
在线阅读 下载PDF
西门子s7 GRAPH在探料系统中的运用
6
作者 徐坤龙 《有色冶金设计与研究》 2015年第3期63-65,共3页
概述了韶关冶炼厂探料系统的应用现状,分析了现用PLC程序的优缺点。为了使得程序更简练,增强易读性,运用西门子s7 GRAPH重新编写了探料程序,并进行了仿真运行。仿真实践证明,采用顺序控制程序编程完全可以实现工艺要求,且更加简练、方便。
关键词 探料系统 顺序功能图 S7 graph 编程
在线阅读 下载PDF
Dynamic Slicing of Object Oriented Programs
7
作者 Jian\|jun Zhao Department of Computer Science and Engineering, Fukuoka Institute of Technology, Fukuoka 811 0295, Japan 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期391-397,共7页
Program slice has many applications such as program debugging, testing, maintenance, and complexity measurement. A static slice consists of all statements in program P that may effect the value of variable v a... Program slice has many applications such as program debugging, testing, maintenance, and complexity measurement. A static slice consists of all statements in program P that may effect the value of variable v at some point p , and a dynamic slice consists only of statements that influence the value of variable occurrence for specific program inputs. In this paper, we concern the problem of dynamic slicing of object oriented programs which, to our knowledge, has not been addressed in the literatures. To solve this problem, we present the dynamic object oriented dependence graph (DODG)which is an arc classified digraph to explicitly represent various dynamic dependence between statement instances for a particular execution of an object oriented program. Based on the DODG, we present a two phase backward algorithm for computing a dynamic slice of an object oriented program. 展开更多
关键词 program slicing dynamic dependence graph object oriented program SOFTWARE maintenance DEBUGGING testing
在线阅读 下载PDF
An Alternative Approach for Solving Bi-Level Programming Problems
8
作者 Rashmi Birla Vijay K. Agarwal +1 位作者 Idrees A. Khan Vishnu Narayan Mishra 《American Journal of Operations Research》 2017年第3期239-247,共9页
An algorithm is proposed in this paper for solving two-dimensional bi-level linear programming problems without making a graph. Based on the classification of constraints, algorithm removes all redundant constraints, ... An algorithm is proposed in this paper for solving two-dimensional bi-level linear programming problems without making a graph. Based on the classification of constraints, algorithm removes all redundant constraints, which eliminate the possibility of cycling and the solution of the problem is reached in a finite number of steps. Example to illustrate the method is also included in the paper. 展开更多
关键词 LINEAR programMING PROBLEM Bi-Level programMING PROBLEM graph Algorithm
在线阅读 下载PDF
基于模糊测试的Java反序列化漏洞挖掘 被引量:1
9
作者 王鹃 张勃显 +3 位作者 张志杰 谢海宁 付金涛 王洋 《信息网络安全》 北大核心 2025年第1期1-12,共12页
随着反序列化技术在Java Web应用开发中的广泛应用,针对Java反序列化机制的攻击也日益增多,已严重威胁Java Web应用的安全性。当前主流的黑名单防范机制无法有效防御未知的反序列化漏洞利用,而现有的Java反序列化漏洞挖掘工具大多依赖... 随着反序列化技术在Java Web应用开发中的广泛应用,针对Java反序列化机制的攻击也日益增多,已严重威胁Java Web应用的安全性。当前主流的黑名单防范机制无法有效防御未知的反序列化漏洞利用,而现有的Java反序列化漏洞挖掘工具大多依赖静态分析方法,检测精确度较低。文章提出一种基于模糊测试的Java反序列化漏洞挖掘工具DSM-Fuzz,该工具首先通过对字节码进行双向追踪污点分析,提取所有可能与反序列化相关的函数调用链。然后,利用基于TrustRank算法的函数权值分配策略,评估函数与反序列化调用链的关联性,并根据相关性权值对模糊测试种子分配能量。为进一步优化测试用例的语法结构和语义特征,文章设计并实现了一种基于反序列化特征的种子变异算法。该算法利用反序列化的Java对象内部特征优化种子变异过程,并引导模糊测试策略对反序列化漏洞调用链进行路径突破。实验结果表明,DSM-Fuzz在漏洞相关代码覆盖量方面较其他工具提高了约90%。此外,该工具还在多个主流Java库中成功检测出50%的已知反序列化漏洞,检测精确度显著优于其他漏洞检测工具。因此,DSM-Fuzz可有效辅助Java反序列化漏洞的检测和防护。 展开更多
关键词 Java反序列化漏洞 模糊测试 污点分析 漏洞挖掘 程序调用图
在线阅读 下载PDF
System Dependence Graph Construction for Aspect Oriented C++
10
作者 SHI Liang XU Baowen 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第3期555-560,共6页
This paper proposes an extended system dependence graph called AspectSDG to represent control and data dependences for AspeetC++ programs, and presents an approach for the construction of AspectSDG. This approach de... This paper proposes an extended system dependence graph called AspectSDG to represent control and data dependences for AspeetC++ programs, and presents an approach for the construction of AspectSDG. This approach decomposes aspect-oriented programs into three parts: component codes, aspect codes, and weaving codes. It constructs program dependence graphs (PDGs) for each part, and then connects the PDGs at call sites to form the complete AspectSDG. The AspectSDG can deal with advice precedence correctly, and represent the additional dependences caused by aspect codes. Based on this model, we introduce how to compute a static slice of an AspectC+ + program. 展开更多
关键词 program analysis system dependence graph ASPECT-ORIENTED slicing
在线阅读 下载PDF
A Comparative Study on Test Case Generation of Concurrent Programs
11
作者 Bidush Kumar Sahoo Mitrabinda Ray 《World Journal of Engineering and Technology》 2016年第2期273-280,共8页
This paper deals with a comparative study on testing of concurrent programs based on different techniques. The various challenges in testing concurrent programming are: defining test coverage criteria based on control... This paper deals with a comparative study on testing of concurrent programs based on different techniques. The various challenges in testing concurrent programming are: defining test coverage criteria based on control flow, generating control flow graph of nondeterministic programs, investigating the applicability of sequential testing criteria to parallel program testing etc. For solving these issues, some existing techniques are discussed in this study. Various researchers use an intermediate graph called Event Inter Actions Graph (EIAG) to solve the problem of generating the control flow graph of nondeterministic programs. Some researches propose an intermediate graph called Interaction Sequence Testing Criteria (ISTC) approach based on sequence of interactions to solve the problem of test coverage criteria based on control and data flow. Another method to solve the problem of generating test coverage based on control flow graph of nondeterministic programs is constraint based approach. It needs constrained elements to generate test case which includes structural element and constraint. The selection of good test cases has been addressed by test data generation technique. The technique of concurrent path analysis approach is used to solve the problem of applicability of sequential testing criteria to parallel program testing. It reduces the number of combined concurrent test paths. The sequential test paths are combined to form concurrent test path. The Integration and System Test Automation (ISTA) approach is used to solve the problem of applicability of sequential testing criteria to parallel program testing. It is used for automated test case generation and execution by using high-level Petri net is a finite state test model. 展开更多
关键词 Concurrent program EIAG Dead Statement Control Flow graph Nondeterministic program
在线阅读 下载PDF
Program Monitoring Based on Automaton Simulation
12
作者 LING Xiang HUANG Bo WU Guoqing 《Wuhan University Journal of Natural Sciences》 CAS 2013年第2期102-108,共7页
To check whether a program behaves in expectation, program monitoring systems are used for intrusion detection. This article presents a program monitoring system using automaton simulation based on the state graphs ex... To check whether a program behaves in expectation, program monitoring systems are used for intrusion detection. This article presents a program monitoring system using automaton simulation based on the state graphs extracted from C programs through static analysis. For complete state graph construction, a pointer alias analysis method is proposed to solve the function pointers for obtaining actual control flows. After compiling, pro- grams are instrumented with probes to report the internal states when they are running. A program monitor is built in the kernel of Linux system, which monitors the states of programs from probes and checks the paths of execution. This monitoring system could respond to the abnormal behaviors immediately to protect the sys- tems and programs from further damages. 展开更多
关键词 program monitonng intrusion detection h.mCtlOncall state graph
原文传递
我国程序设计教学的知识图谱分析 被引量:1
13
作者 王新 周勇 +2 位作者 徐月美 孙晋非 李磊 《高教学刊》 2025年第9期85-88,共4页
为探索我国程序设计教学改革的特征和演进脉络,该文采用知识可视化的文献计量方法,对我国1999年至2023年的程序设计教学的文献进行分析。研究结果为,程序设计教学研究呈现三大特征包括新工科重塑程序设计教学理念、在线课程平台重构程... 为探索我国程序设计教学改革的特征和演进脉络,该文采用知识可视化的文献计量方法,对我国1999年至2023年的程序设计教学的文献进行分析。研究结果为,程序设计教学研究呈现三大特征包括新工科重塑程序设计教学理念、在线课程平台重构程序设计教学模式和人工智能驱动程序设计学习变革。通过关键词时间图谱得出研究结论,我国程序设计教学研究与教育部的政策导向及时代环境存在紧密联系;我国程序设计教学研究的演进可以归纳为早期萌芽、稳步增长和深化发展三个不同阶段。 展开更多
关键词 程序设计 知识图谱 教学改革 人工智能 数字化
在线阅读 下载PDF
Subgraph Isomorphism Based Intrinsic Function Reduction in Decompilation
14
作者 Yanzhao Liu Yinliang Zhao +1 位作者 Lei Zhang Kai Liu 《Journal of Software Engineering and Applications》 2016年第3期80-90,共11页
Program comprehension is one of the most important applications in decompilation. The more abstract the decompilation result the better it is understood. Intrinsic function is introduced by a compiler to reduce the ov... Program comprehension is one of the most important applications in decompilation. The more abstract the decompilation result the better it is understood. Intrinsic function is introduced by a compiler to reduce the overhead of a function call and is inlined in the code where it is called. When analyzing the decompiled code with lots of inlined intrinsic functions, reverse engineers may be confused by these detailed and repeated operations and lose the goal. In this paper, we propose a method based graph isomorphism to detect intrinsic function on the CFG (Control Flow Graph) of the target function first. Then we identify the boundary of the intrinsic function, determine the parameter and return value and reduce the intrinsic function to a single function call in the disassembled program. Experimental results show that our method is more efficient at reducing intrinsic functions than the state-of-art decompilers such as Hex-Rays, REC and RD (Retargetable Decompiler). 展开更多
关键词 program Comprehension DECOMPILATION graph Isomorphism Intrinsic Function
在线阅读 下载PDF
基于知识图谱的Python程序设计课程个性化AI助学模式探索 被引量:2
15
作者 李知菲 彭浩 王晖 《计算机教育》 2025年第8期200-205,共6页
针对目前本科课程个性化教学不足的现状,提出基于知识图谱的本科课程个性化AI助学模式,以Python程序设计课程为例,阐述如何通过超星知识图谱功能,对课程内容进行系统梳理和结构化表示,并以此为基础为学生提供个性化的学习路径推荐、学... 针对目前本科课程个性化教学不足的现状,提出基于知识图谱的本科课程个性化AI助学模式,以Python程序设计课程为例,阐述如何通过超星知识图谱功能,对课程内容进行系统梳理和结构化表示,并以此为基础为学生提供个性化的学习路径推荐、学习资源推送及学情分析,通过课程教学实践说明该模式在提高学生学习效率、促进深度学习、实现因材施教等方面具有显著效果。 展开更多
关键词 知识图谱 学习路径 Python程序设计 个性化AI助学模式
在线阅读 下载PDF
物联网中虚拟网络功能转发图算法设计
16
作者 任诚 刘静 +2 位作者 王宇 李亚鑫 李红伟 《计算机科学与探索》 北大核心 2025年第6期1632-1639,共8页
近年来,物联网的迅速发展和其终端数量的爆炸式增长对物联网网络服务提出了更高要求。结合网络功能虚拟化(NFV)和软件定义网络(SDN)技术,对新一代物联网服务功能虚拟化和软件化,可以将网络服务表示为虚拟网络功能转发图(VNF-FG)。现有... 近年来,物联网的迅速发展和其终端数量的爆炸式增长对物联网网络服务提出了更高要求。结合网络功能虚拟化(NFV)和软件定义网络(SDN)技术,对新一代物联网服务功能虚拟化和软件化,可以将网络服务表示为虚拟网络功能转发图(VNF-FG)。现有的研究主要关注VNF-FG嵌入(VNF-FGE)问题,把VNF-FG作为确定输入,忽略了VNF-FG的设计问题;又或者在设计VNF部署算法时,没有充分利用VNF-FG的图结构,使算法有一定局限性。因此,研究VNF-FG有向无环图(DAG)设计问题。针对一组到达物联网终端的服务请求,设计约束,建立一个整数线性规划(ILP)模型生成最优无环VNF-FG;以最小化虚拟节点总数为目标,提出一种高效的虚拟网络功能转发无环图设计算法,充分利用已有虚拟节点,并找出导致成环的关键VNF实例,通过反向增扩恰当数量的关键VNF以消除VNF-FG中的环路,在保证无环和最小化虚拟节点数量之间进行折中。实验结果表明,该算法与ILP模型之间的差距很小;与其他已有算法相比,在不同SFC请求数量下,该算法生成的虚拟节点个数平均降低了17.67%。 展开更多
关键词 网络功能虚拟化 物联网 整数线性规划 虚拟网络功能转发图
在线阅读 下载PDF
An Intelligent Assessment Tool for Students’ Java Submissions in Introductory Programming Courses
17
作者 Fatima Al Shamsi Ashraf Elnagar 《Journal of Intelligent Learning Systems and Applications》 2012年第1期59-69,共11页
This paper presents a graph-based grading system for Java introductory programming courses, eGrader. This system grades submission both dynamically and statically to ensure a complete and through grading job. While dy... This paper presents a graph-based grading system for Java introductory programming courses, eGrader. This system grades submission both dynamically and statically to ensure a complete and through grading job. While dynamic analysis is based on JUnit framework, the static analysis is based on the graph representation of the program and its quality which is measured by software metrics. The graph representation is based on the Control Dependence Graphs (CDG) and Method Call Dependencies (MCD). eGrader outperforms existing systems in two ways: the ability of grading submission with semantic-errors, effectively, and generating reports for students, as a feedback on their performance, and instructors on the overall performance of the class. eGrader is well received by instructors not only for saving time and effort but also for its high success rate that is measured by four performance indicators which are sensitivity (97.37%), specificity (98.1%), precision (98.04%) and accuracy (97.07%). 展开更多
关键词 JAVA programMING COMPUTER Aided Education COMPUTER Aided Assessment Control DEPENDENCE graphS
暂未订购
Program Slicing Based Buffer Overflow Detection
18
作者 Yingzhou Zhang Wei Fu +1 位作者 Xiaofei Qian Wei Chen 《Journal of Software Engineering and Applications》 2010年第10期965-971,共7页
The development of the information technology has brought threats to human society when it has influenced seriously the global politics, economics and military etc. But among the security of information system, buffer... The development of the information technology has brought threats to human society when it has influenced seriously the global politics, economics and military etc. But among the security of information system, buffer overrun vulnerability is undoubtedly one of the most important and common vulnerabilities. This paper describes a new technology, named program slicing, to detect the buffer overflow leak in security-critical C code. First, we use slicing technology to analyze the variables which may be with vulnerability and extract the expressions which will bring memory overflow. Secondly, we utilize debug technology to get the size of memory applied by the variable and the size of memory used for these code segments (the slicing result) further. Therefore we can judge whether it will overflow according to the analysis above. According to the unique excellence of program slicing performing in the large-scale program’s debugging, the method to detect buffer overrun vulnerability described in this paper will reduce the workload greatly and locate the code sentences affected by corresponding variable set quickly, particularly including the potential vulnerability caused by parameter dependence among the subroutines. 展开更多
关键词 program SLICING BUFFER OVERFLOW Inter-Procedure SLICING DEBUG System DEPENDENCE graph
暂未订购
全国高校俄语专业培养方案知识图谱的创建与应用
19
作者 宁琦 刘淼 《中国俄语教学》 2025年第1期83-95,共13页
外语现代化教学的发展和大数据技术的普及对俄语专业教师教研和教学改革提出了新的要求。本文在教育部俄语人才培养模式改革虚拟教研室的框架下,基于全国14所高校俄语专业的培养方案,创建了《全国高校俄语专业培养方案知识图谱》,包含7... 外语现代化教学的发展和大数据技术的普及对俄语专业教师教研和教学改革提出了新的要求。本文在教育部俄语人才培养模式改革虚拟教研室的框架下,基于全国14所高校俄语专业的培养方案,创建了《全国高校俄语专业培养方案知识图谱》,包含70个知识单元、527个知识点和1879条知识关联,构成了立体可视的俄语专业教育体系图谱。该图谱展现了各校培养方案的共性与个性,以及普遍存在的问题。研究表明,知识图谱可用于构建在线教研社区,嵌入智慧教学平台,挖掘教学数据,升级人才培养方案,是理解和优化俄语专业教育的有力工具,能够为培养具备家国情怀与全球视野的优秀复合型俄语人才提供智力支持。 展开更多
关键词 俄语专业 知识图谱 培养方案 人才培养模式改革
在线阅读 下载PDF
“C语言程序设计”项目式教学数智化重构实践
20
作者 刘影 《无线互联科技》 2025年第18期112-115,124,共5页
针对高校“C语言程序设计”课程教学中长期存在的知识碎片化、实践孤岛化、评价单一化三大痛点,文章提出“图谱导航·角色赋能”数智化教学范式。通过深度融合动态知识图谱与多角色协同机制,重构“线上+线下”混合式教学流程,以期... 针对高校“C语言程序设计”课程教学中长期存在的知识碎片化、实践孤岛化、评价单一化三大痛点,文章提出“图谱导航·角色赋能”数智化教学范式。通过深度融合动态知识图谱与多角色协同机制,重构“线上+线下”混合式教学流程,以期能为数字化教学改革提供借鉴和参考。 展开更多
关键词 人工智能 知识图谱 多角色协同 C语言 项目化教学
在线阅读 下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部